The bill still includes what the House Armed Services Committee referred to as the widest empowerment of CISA since SolarWinds. The National Defense Authorization Act for...
Taking a proactive approach is a critical step in improving the way the government combats threats. One in three cyber incidents strike the public sector and...
Different cloud environments have different security needs. Here’s how to create a cloud-security scaffolding to strengthen protections while reducing manual support. On-prem data centers, public cloud...
A hacking group, which appears to be a part of the Gaza cyber gang, has been discovered carrying out attacks using malicious Excel 4.0 macros. The...
The document is the third in a four-part series of guidance that categorizes security responsibilities according to their relevance for the cloud service providers, mobile operators...
The SolarWinds cyberattack was unprecedented in both scope and scale. The sophisticated breach saw hackers bake their exploit into a trusted software update pushed out to...
The new definition allows industry more flexibility to decide what should trigger reporting mandates for the sector. The Transportation Security Administration has changed the criteria pipeline...
Aleksandr Grichishkin, 34, pleaded guilty to providing a server allowing cybercriminals temporary use of IP addresses to bypass security measures and exploit financial data. A U.S....
Federal cybersecurity officials would prefer you keep your holidays a little more secure. Over the Thanksgiving holiday, my good friend Michael Bechetti texted me a funny...
The agency is ramping up efforts to exercise its new authorities to hunt for threats across the .gov enterprise. The Cybersecurity and Infrastructure Security Agency is...
Recent Comments